Every day U.S. military and security units receive vast amounts of data collected by intelligence, surveillance and reconnaissance (ISR) sensors. Human analysts constantly review this data, searching for possible threats.

To aid this effort, researchers from the Georgia Tech Research Institute (GTRI) are helping to improve the capabilities of the nation's Multi-Disciplinary Intelligence (Multi-INT) system, which monitors incoming data.

A key to improving the U.S. Multi-INT system involves bringing "actionable intelligence" – information that could require immediate response – to the attention of human analysts as quickly as possible, explained Chris Kennedy, a research program analyst who leads the MINT effort in GTRI. But finding actionable intelligence is a challenge; it must be identified from myriad raw data gathered by intelligence sources, which include optical and radar sensors, communications sensors, measurements and signatures intelligence (MASINT) and others.

"The number of analysts is limited, and they can only perform a certain number of actions," said Kennedy. "So out of a huge set of information – which could involve millions of data points – you need to find the most valuable pieces to prioritize for investigation and possible action."

Accelerating the System

GTRI's work addresses two related Multi-INT challenges:

Network bandwidth and workstation processing power sometimes can't keep up with incoming data sets that contain terabytes or even petabytes of raw information.

Human analysts need to stay on top of incoming data by concentrating on the most significant information.

Metadata are small amounts of information that contain the key elements of a data point, which is an individual piece of data. For example, in the case of a car moving down a road, its metadata might consist of the make/model/color, location, speed and number of passengers. Those attributes are highly informative, yet much easier to transmit and process than, say, a video of the car, which would involve large amounts of data.

The GTRI approach creates metadata fields, or utilizes existing ones, thereby characterizing each data point with minimal overhead. Then only the metadata is transmitted to the main system for immediate processing; the rest of the raw data is retained in an archive in case it's needed later.

The metadata technique results in much smaller amounts of information being relayed from ISR sources to computers. That reduces processing loads, helping computers and networks keep up with incoming data. The raw data is also stored and can be examined if necessary.

"Obviously under this data-reduction approach there are information losses that could affect how our program makes decisions, which is why our system is only a tool for – and not a replacement for – the human analyst," Kennedy said.

Informing the Analyst

The second challenge – supporting human analysts – is addressed by methods that improve the system's ability to identify, compare and prioritize different types of information.

First, the gathered metadata is converted into a single uniform format. By creating one format for all incoming metadata, data points from many different sources can be more readily identified and manipulated. This uniform format is independent of the data source, so different types of ISR data can be processed together.

Then, utilizing the identity-bearing metadata tags, GTRI researchers use complex machine-learning algorithms to find and compare related pieces of information. Powerful concurrent-computing techniques allow problems to be divided up and computed on multiple processors. That helps the system perform the complex task of determining which data points have been previously associated with other data points.

Metadata approaches have been used in the past, Kennedy explained, but only for a single intelligence technology – such as a text-recognition program that identifies keywords in voice-to-text data. The GTRI approach differs because it integrates metadata from a variety of intelligence disciplines into a single technology that prioritizes corroborative relationships from multiple sources.

Under GTRI's integrated approach, one set of potentially significant signals could be quickly compared to others in the same vicinity to form an in-depth picture. For example, in a disaster relief scenario, one aircraft-mounted ISR sensor might detect information indicating abandoned vehicles. But if another sensor detected a functioning communications device in one of the vehicles, that would indicate a higher likelihood of finding a survivor, prompting a rescue reconnaissance.

The relationship found between the communications device's signal information and the vehicle's imagery information would be prioritized against other found relationships and displayed to the analyst on mapping software, such as GTRI's FalconView program.

Ongoing Improvement

Recently, the MINT team began working with a GTRI group that's involved in the ongoing development of Stinger, a Georgia Tech-produced graph-analysis software. Stinger's capabilities could aid MINT in recording and analyzing information about long-term patterns of observed relationships – that, for instance, a type of vehicle and a specific communications device are frequently observed together by independent sensors.

This information would then be sent to an analyst through a web-based portal, giving the analyst access to alerts regarding specific kinds of relationships identified by MINT.

The MINT team is presently focused on improving the program's capacity to process many data points quickly. They're using three primary sets of testing data involving thousands or millions of data points over lengthy time spans. The researchers' goal is to achieve real-time or near-real-time processing capability, so analysts can be alerted to abnormal information almost instantly.

"We want to get to the point where, as the latest data is coming in, it's being correlated against the data we already have," Kennedy said. "We need to able to say to the analyst, 'OK you've got a million data points, but look at these 10 first.' "

Related Stories

(Phys.org) —A research team at the Georgia Tech Research Institute (GTRI) has developed a small electronic sensing device that can alert users wirelessly to the presence of chemical vapors in the atmosphere. ...

The US government's clandestine PRISM Internet program exposed by Edward Snowden targets suspect email addresses and phone numbers but does not search for keywords like terrorism, officials said Wednesday.

(Phys.org) —Today, unmanned aerial vehicles (UAVs) are a rapidly growing part of military operations, and forces that aren't prepared to deal with them are vulnerable. To protect its ground forces, the ...

(Phys.org)—A research team at the Georgia Tech Research Institute (GTRI) is developing an airborne testing capability for sensors, communications devices and other airborne payloads. This aerial test bed, ...

Recommended for you

Using complex computational algorithms based on repeated sampling, a University of Arkansas graduate student helped spearhead a project to develop a computer simulator that provides customized electron beam ...

A team of researchers at Google has been looking into ways to change the way links are retrieved by its famous search engine—instead of ranking them based on popularity, the researchers are looking into ...

Visitors to interactive virtual worlds want the ability to significantly affect the outcome of a story, but authoring these digital experiences is extremely complex. A new platform developed by Disney Research ...

If you live in a city, you know that a fair amount of your movement around town is social in nature. But how much, exactly? A new study co-authored by MIT researchers uses a novel method to infer that around ...

Social networks such as Facebook, LinkedIn and Twitter play an increasingly central role in our lives. Centrality is also an important concept in the theory of social networks. Centrality of an individual, called a "node" ...

User comments : 0

Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.

Javascript is currently disabled in your web browser. For full site functionality, it is necessary to enable Javascript.
In order to enable it, please see these instructions.